Compare commits

..

13 Commits

Author SHA1 Message Date
e318dfd2f6 shrink boot media footprint 2025-07-27 11:11:40 -04:00
31296f5b0f add poweroff and reboot functions 2025-07-27 07:54:18 -04:00
5d35d19543 clean up commented code 2025-07-27 07:07:26 -04:00
28d4cf288e pxe boot in flake 2025-07-27 06:27:24 -04:00
bc572173d7 facts: add APIVersion constant 2025-07-24 21:51:46 -04:00
e659349290 add qemu testing to flake 2025-07-24 19:01:11 -04:00
96f54930ee fix boot issues on hyper-v 2025-07-24 15:54:34 -04:00
fcf2300732 implement bootable orphan client 2025-07-23 21:24:34 -04:00
01ab4b632b update gitignore 2025-07-23 20:47:44 -04:00
3298aa6f36 update flake 2025-07-23 13:32:15 -04:00
dfe95b66b0 create bootable nixos system 2025-07-23 13:31:38 -04:00
c16338fa6e update gitignore 2025-07-21 13:40:30 -04:00
caa300b2a7 fix flake to properly run the client 2025-07-21 13:40:06 -04:00
8 changed files with 235 additions and 14 deletions

3
.gitignore vendored
View File

@@ -30,3 +30,6 @@ go.work.sum
# Vscode directory # Vscode directory
.vscode/ .vscode/
# Nix results
result

View File

@@ -7,6 +7,8 @@ import (
"github.com/zcalusic/sysinfo" "github.com/zcalusic/sysinfo"
) )
const APIVersion string = "facts/v1alpha1"
type FactsResponse struct { type FactsResponse struct {
APIVersion string `json:"apiVersion"` APIVersion string `json:"apiVersion"`
CPUInfo sysinfo.CPU `json:"cpu"` CPUInfo sysinfo.CPU `json:"cpu"`
@@ -24,7 +26,7 @@ func GetFacts(next http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) { return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
resp := FactsResponse{ resp := FactsResponse{
APIVersion: "v1", APIVersion: APIVersion,
CPUInfo: si.CPU, CPUInfo: si.CPU,
BoardInfo: si.Board, BoardInfo: si.Board,
DeviceInfo: si.Product, DeviceInfo: si.Product,

9
client/power/power.go Normal file
View File

@@ -0,0 +1,9 @@
package power
const APIVersion string = "power/v1alpha1"
type PowerActionResponse struct {
APIVersion string `json:"apiVersion"`
Action string `json:"action"`
Success bool `json:"success"`
}

30
client/power/poweroff.go Normal file
View File

@@ -0,0 +1,30 @@
package power
import (
"net/http"
"os/exec"
"git.dubyatp.xyz/orphanage/client/httputil"
)
func PowerOffResponse(success bool) PowerActionResponse {
resp := PowerActionResponse{
APIVersion: APIVersion,
Action: "poweroff",
Success: success,
}
return resp
}
func PowerOff(next http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
cmd := exec.Command("systemctl", "poweroff")
err := cmd.Run()
if err != nil {
httputil.WriteJSON(w, http.StatusOK, PowerOffResponse(false))
} else {
httputil.WriteJSON(w, http.StatusOK, PowerOffResponse(true))
}
})
}

30
client/power/reboot.go Normal file
View File

@@ -0,0 +1,30 @@
package power
import (
"net/http"
"os/exec"
"git.dubyatp.xyz/orphanage/client/httputil"
)
func RebootResponse(success bool) PowerActionResponse {
resp := PowerActionResponse{
APIVersion: APIVersion,
Action: "reboot",
Success: success,
}
return resp
}
func Reboot(next http.Handler) http.Handler {
return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
cmd := exec.Command("systemctl", "reboot")
err := cmd.Run()
if err != nil {
httputil.WriteJSON(w, http.StatusOK, RebootResponse(false))
} else {
httputil.WriteJSON(w, http.StatusOK, RebootResponse(true))
}
})
}

View File

@@ -5,14 +5,17 @@ import (
"git.dubyatp.xyz/orphanage/client/facts" "git.dubyatp.xyz/orphanage/client/facts"
"git.dubyatp.xyz/orphanage/client/httputil" "git.dubyatp.xyz/orphanage/client/httputil"
"git.dubyatp.xyz/orphanage/client/power"
"git.dubyatp.xyz/orphanage/client/testfunc" "git.dubyatp.xyz/orphanage/client/testfunc"
) )
func AddRoutes( func AddRoutes(
mux *http.ServeMux, mux *http.ServeMux,
) { ) {
mux.Handle("/", http.NotFoundHandler()) mux.Handle("GET /", http.NotFoundHandler())
mux.Handle("/helloworld", httputil.HelloWorld(nil)) mux.Handle("GET /helloworld", httputil.HelloWorld(nil))
mux.Handle("/testjson", testfunc.HelloWorldJSON(nil)) mux.Handle("GET /testjson", testfunc.HelloWorldJSON(nil))
mux.Handle("/facts", facts.GetFacts(nil)) mux.Handle("GET /facts", facts.GetFacts(nil))
mux.Handle("POST /power/reboot", power.Reboot(nil))
mux.Handle("POST /power/poweroff", power.PowerOff(nil))
} }

43
flake.lock generated
View File

@@ -1,12 +1,48 @@
{ {
"nodes": { "nodes": {
"nixlib": {
"locked": {
"lastModified": 1736643958,
"narHash": "sha256-tmpqTSWVRJVhpvfSN9KXBvKEXplrwKnSZNAoNPf/S/s=",
"owner": "nix-community",
"repo": "nixpkgs.lib",
"rev": "1418bc28a52126761c02dd3d89b2d8ca0f521181",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "nixpkgs.lib",
"type": "github"
}
},
"nixos-generators": {
"inputs": {
"nixlib": "nixlib",
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1751903740,
"narHash": "sha256-PeSkNMvkpEvts+9DjFiop1iT2JuBpyknmBUs0Un0a4I=",
"owner": "nix-community",
"repo": "nixos-generators",
"rev": "032decf9db65efed428afd2fa39d80f7089085eb",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "nixos-generators",
"type": "github"
}
},
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1751637120, "lastModified": 1752950548,
"narHash": "sha256-xVNy/XopSfIG9c46nRmPaKfH1Gn/56vQ8++xWA8itO4=", "narHash": "sha256-NS6BLD0lxOrnCiEOcvQCDVPXafX1/ek1dfJHX1nUIzc=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "5c724ed1388e53cc231ed98330a60eb2f7be4be3", "rev": "c87b95e25065c028d31a94f06a62927d18763fdf",
"type": "github" "type": "github"
}, },
"original": { "original": {
@@ -17,6 +53,7 @@
}, },
"root": { "root": {
"inputs": { "inputs": {
"nixos-generators": "nixos-generators",
"nixpkgs": "nixpkgs" "nixpkgs": "nixpkgs"
} }
} }

117
flake.nix
View File

@@ -3,9 +3,13 @@
inputs = { inputs = {
nixpkgs.url = "nixpkgs/nixos-unstable"; nixpkgs.url = "nixpkgs/nixos-unstable";
nixos-generators = {
url = "github:nix-community/nixos-generators";
inputs.nixpkgs.follows = "nixpkgs";
};
}; };
outputs = { self, nixpkgs }: outputs = { self, nixpkgs, nixos-generators, ... }:
let let
lastModifiedDate = self.lastModifiedDate or self.lastModified or "19700101"; lastModifiedDate = self.lastModifiedDate or self.lastModified or "19700101";
version = builtins.substring 0 8 lastModifiedDate; version = builtins.substring 0 8 lastModifiedDate;
@@ -17,14 +21,116 @@
packages = forAllSystems (system: packages = forAllSystems (system:
let let
pkgs = nixpkgsFor.${system}; pkgs = nixpkgsFor.${system};
in clientPackage = pkgs.buildGoModule {
{ pname = "client";
default = pkgs.buildGoModule {
pname = "orphanage-client";
inherit version; inherit version;
src = ./client; src = ./client;
vendorHash = null; vendorHash = null;
}; };
in
{
default = clientPackage;
boot-env-iso = nixos-generators.nixosGenerate {
inherit system;
format = "iso";
modules = [
({modulesPath, ...}: {
imports = [
(modulesPath + "/profiles/minimal.nix")
(modulesPath + "/profiles/base.nix")
];
system.stateVersion = "25.05";
boot.initrd.kernelModules = ["hv_vmbus" "hv_storvsc"]; # Hyper-V Support
# Disable unneeded features
documentation.enable = false;
fonts.fontconfig.enable = false;
services.udisks2.enable = false;
networking.firewall.enable = false; # Technically we COULD use the firewall, but given that this is a network-dependent, one-time-use service, it would cause more issues
services.getty.autologinUser = "root";
environment.systemPackages = [ clientPackage ];
environment.etc."profile.local".text = ''
client
'';
isoImage.squashfsCompression = "gzip -Xcompression-level 1";
})
];
};
boot-env-pxe = let
systemConfig = nixpkgs.lib.nixosSystem {
inherit system;
modules = [
({modulesPath, ...}: {
imports = [
(modulesPath + "/installer/netboot/netboot-minimal.nix")
];
system.stateVersion = "25.05";
boot.initrd.kernelModules = ["hv_vmbus" "hv_storvsc"]; # Hyper-V Support
# Disable unneeded features
documentation.enable = nixpkgs.lib.mkForce false;
documentation.nixos.enable = nixpkgs.lib.mkForce false;
fonts.fontconfig.enable = false;
services.udisks2.enable = false;
users.allowNoPasswordLogin = true;
users.mutableUsers = false;
security.sudo.enable = false;
services.getty.helpLine = nixpkgs.lib.mkForce "";
nix.enable = false;
networking.firewall.enable = false; # Technically we COULD use the firewall, but given that this is a network-dependent, one-time-use service, it would cause more issues
services.getty.autologinUser = nixpkgs.lib.mkForce "root";
environment.systemPackages = [ clientPackage ];
environment.etc."profile.local".text = ''
client
'';
})
];
}; in pkgs.stdenv.mkDerivation {
name = "boot-env-pxe";
buildCommand = ''
mkdir -p $out
cp -r ${systemConfig.config.system.build.kernel}/bzImage $out/kernel
cp -r ${systemConfig.config.system.build.netbootRamdisk} $out/initrd
cat <<EOF > $out/boot.ipxe
#!ipxe
imgfree
kernel http://127.0.0.1:8081/kernel init=${systemConfig.config.system.build.toplevel}/init initrd=initrd ${toString systemConfig.config.boot.kernelParams} ''${cmdline}
initrd http://127.0.0.1:8081/initrd
boot
EOF
'';
};
});
apps = forAllSystems (system:
let
pkgs = nixpkgsFor.x86_64-linux;
iso = self.packages.x86_64-linux.boot-env-iso;
in
{
test-iso-x86_64 = {
type = "app";
program = "${pkgs.writeScriptBin "test-iso" ''
#!/bin/sh
${pkgs.qemu}/bin/qemu-system-x86_64 -cdrom ${iso}/iso/*.iso -m 1G \
-net nic,model=rtl8139 -net user,hostfwd=tcp::8080-:8080
''}/bin/test-iso";
};
}); });
devShells = forAllSystems (system: devShells = forAllSystems (system:
@@ -38,6 +144,7 @@
pkgs.bashInteractive pkgs.bashInteractive
pkgs.go pkgs.go
pkgs.delve pkgs.delve
pkgs.qemu_kvm
]; ];
}; };
}); });